<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>CryptoLat - a Pedagogical Software on Lattice Cryptomorphisms and Lattice Properties</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Computer Science Department, University of Nicosia 46 Makedonitissas Ave.</institution>
          ,
          <addr-line>1700 Nicosia</addr-line>
          ,
          <country country="CY">Cyprus</country>
        </aff>
      </contrib-group>
      <fpage>93</fpage>
      <lpage>103</lpage>
      <abstract>
        <p>Although lattice theory is a rich field dating from Dedekind, Birkhoff and O¨re, few studies in FCA use lattice properties to enhance their results. Moreover, out of the many cryptomorphisms associated with lattices, only the ones associating context, lattice and implicational system are effectively studied. CryptoLat is a software implemented in C] which provides an intuitive view on different cryptomorphisms of lattices as well as on different properties of lattices. Its purpose is pedagogical, for students and researchers likewise, and work by showing incremental changes in the lattice and the associated cryptomorphisms.</p>
      </abstract>
      <kwd-group>
        <kwd>Lattice Cryptomorphisms</kwd>
        <kwd>Lattice Properties</kwd>
        <kwd>Pedagogy</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        This article, together with the software, originates from an observation about the
current state of research in the lattice and the FCA communities. Lattice theory
dates back to the works of Dedekind, Birkhoff [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and O¨ re [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], and is a rich field
in which FCA is deeply and fundamentally rooted. Despite that fact, relatively
few studies in FCA takes advantage of lattice properties to enhance their results.
This dichotomy of the two communities is apparent in the research interests:
on the one hand, researchers from the graph and ordered set communities are
focusing on equivalence theorem and characterizations, while on the other hand
data mining researchers are more focused on practical or practically oriented
results.
      </p>
      <p>
        Although it is natural that this dichotomy exists because of the nature of each
community’s focus of interest, it is the author’s suggestion that improvement of
the communication between the two communities may produce a synergistic
effect. The study of lattice cryptomorphisms and lattice properties is important
for many reasons: other than giving a better understanding of the tools being
used, it was shown to lead to the discovery of efficient algorithms in counting
the number of Moore families [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] or calculating the stem basis [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] for example.
      </p>
      <p>There are two main purposes for this software: first, to promote and to give
a better understanding of the many shapes and forms of lattices thanks to an
incremental approach - any change made in any equivalent cryptomorphism is
c paper author(s), 2013. Published in Manuel Ojeda-Aciego, Jan Outrata (Eds.): CLA
2013, pp. 93{103, ISBN 978{2{7466{6566{8, Laboratory L3i, University of La
Rochelle, 2013. Copying permitted only for private and academic purposes.
transcribed to the other cryptomorphisms. Second, to help familiarize users to
fundamental latticial properties that are recalculated after any modification. Its
purpose is pedagogical for both students and researchers. Students can learn
and get a better understanding on what is happening during the construction
of the lattice and the implicational basis, while researchers can test
hypotheses and find small illustrating examples. The program is written in C] and is
freely available (executable and source code) at http://www.cs.unic.ac.cy/
florent/software.htm</p>
      <p>This paper is organized as follows: we start in Sec. 2 by describing the
software itself. Sec 3 will recall the well-known definitions of lattices and some of
the existing cryptomorphisms implemented in CryptoLat, together with a short
explanation on how the equivalence is done. Finally, we compare in Sec. 5
CryptoLat with already existing software.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Description of CryptoLat</title>
      <p>CryptoLat software is structured around a model view controller type of software
architecture: each cryptomorphism described in Sec. 3 is a view with which the
user can interact. The model is the reduced context associated with a Moore
family on which all the calculations are based. When a view is updated, by adding
or deleting a Sperner family for example, then the Moore family associated is
calculated, the associated concept lattice, together with all the properties, is
computed, and the other views get updated.</p>
      <p>Depending on which view getting updated, the process may involve different
steps. If the overhanging list or the Sperner village change, then first the Moore
family associated with the new list, and the reduced context is then calculated.
Similarly, if the input is an arbitrary set system, then the closure system is
calculated as in Sec. 3.2. If the input is on the set of implications, since implications
are usually on the set of attributes, the corresponding Moore family will be dual
to the previous ones. From the reduced context, we are using Closed by One
algorithm to calculate the concept lattice.</p>
      <p>Fig. 1 shows a screen shot of the software with the five different views: the
Moore family on top, the context as a datagrid, the list of implications, the list
of overhanging and the list of Sperner families. The drawing of the lattice is done
with a simple algorithm that optimise the position of each concept depending
on the number (and position) of concepts covered.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Cryptomorphisms of Lattices</title>
      <p>
        In this section, we present the different cryptomorphisms of lattices implemented
in CryptoLat in details; we do not claim to be exhaustive, so we refer the readers
to [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] for a survey on those cryptomorphisms. Since we are describing
implementations, the following descriptions needs only to be for the finite case.
Different yet equivalent definitions for lattices exist: here, we will define a
lattice (L, ∧, ∨) as a set L with two binary operators satisfying the following four
properties:
– Associativity: x ∧ (y ∧ z) = (x ∧ y) ∧ z and x ∨ (y ∨ z) = (x ∨ y) ∨ z
– Commutativity: x ∧ y = y ∧ x and x ∨ y = y ∨ x
– Idempotence: x ∧ x = x and x ∨ x = x
– Absorption: x ∧ (y ∨ x) = x and x ∨ (y ∧ x) = x
      </p>
      <p>One can associate an order on the elements of L to these operators as follow:
∀x, y ∈ L, x ≤ y if x ∧ y = x or, equivalently, x ∨ y = y. Fig. 2 shows a
lattice having six elements using its Hasse diagram representation: the elements
of L are depicted by nodes in the plane, and a line segment connects the nodes
corresponding to a covering pair x ≺ y (i.e. x ≤ y and ∀z, x ≤ z ≤ y implies
x = z or y = z), where the node representing y is placed ’higher’ in the plane
than the node representing x.</p>
      <p>Some elements of lattices are of particular interest: in any lattice, we have
a minimal element, usually denoted by 0L or ⊥, and a maximal element 1L or
&gt;. Irreducible elements of the lattice are also the subject of studies since they
constitute minimal generating sets, and are often used to characterize classes
of lattices. An element j of L is join-irreducible if j = ∨X then j ∈ X, or,
f
c
a
b
e</p>
      <p>d
equivalently, j covers only one element in L. Dually, an element m of L is
meetirreducible if m = ∧X then m ∈ X, or m is covered by only one element of L.
Let JL and ML be the sets of join and meet-irreducible of L.
Let S be a finite set. A closure system (or Moore family) C on S is a family of
subsets of S satisfying S ∈ C and, for all A, B ∈ C, A ∩ B ∈ C. A closure system
is a lattice with the following operations:
– C1 ∧ C2 = C1 ∩ C2
– C1 ∨ C2 = ∩{C ∈ C : C1 ∪ C2 ⊆ C}</p>
      <p>Let A be an arbitrary set system on a set S. Then one can associate a closure
system CA to A:</p>
      <p>CA = {∩{Ai : Ai ∈ A}} ∪ {S}
Example 1 (continued). The family {∅, {G0}, {G1}, {G2}, {G1, G2}, {G0, G1, G2}},
with the operators previously defined, constitute a lattice isomorphic to the
lattice of Fig. 2.</p>
      <p>
        Another fundamental cryptomorphism of lattice concerns closure operators.
A closure operator on a set S is a map σ : P(S) → P(S) satisfying ∀X, Y ⊆ S:
– Isotone: X ⊆ Y ⇒ σ(X) ⊆ σ(Y )
– Extensive: X ⊆ σ(X)
– Idempotent: σ(σ(X)) = σ(X)
These three properties together are equivalent to extensivity and path
independence property [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]: σ(X ∪ Y ) = σ(σ((X) ∪ σ((Y )).
      </p>
      <p>The well-known equivalence between closure operators and closure systems
is the following: given the closure system C, the associated closure operator is
σC (X) = ∩{C ∈ C : X ⊆ C}. Conversely, given a closure operator σ, the
associated closure system is the set of fixed points of σ, i.e. Cσ = {X ⊆ S : X =
σ(X)}.</p>
      <p>
        Context Associated with a Lattice
One of the most celebrated cryptomorphism in the FCA community is the one
between a lattice and a binary relation, also known as the basic theorem of
Formal Concept Analysis [
        <xref ref-type="bibr" rid="ref13 ref3">3, 13</xref>
        ].
      </p>
      <p>Formally, a context (G, M, I) is a binary relation I between a set of objects
G and a set of attributes M . One can associate the Galois connection between
P(G) and P(M ) to this binary relation as ∀A ⊆ G, B ⊆ M ,</p>
      <p>A0 = {m ∈ M : ∀g ∈ A, (g, m) ∈ I}</p>
      <p>B0 = {g ∈ G : ∀m ∈ B, (g, m) ∈ I}</p>
      <p>The lattice associated with the context (G, M, I), also called the concept
lattice or Galois lattice, is the set of all concepts (A, B), with A0 = B and
B0 = A, together with the order (A1, B1) ≤ (A2, B2) ⇐⇒ A1 ⊆ A2 ( ⇐⇒
B1 ⊇ B2). Conversely, any lattice L is isomorphic to the Galois lattice of the
context (JL, ML, ≤), also called the reduced context.</p>
      <p>Two other binary relations, the arrows relations, on P(J ) × P(M ) are often
used for characterization theorems. Let j ∈ J, m ∈ M , we define:
– j ↑ m
– j ↓ m
– j l m
⇐⇒ j 6≤ m and j &lt; m+
⇐⇒ j 6≤ m and j− &lt; m
⇐⇒ j ↑ m and j ↓ m
Example 1 (continued). The lattice associated with the context of Fig. 3 is
isomorphic to the lattice of Fig. 2.
– A → B and B → C imply A → C;
– A → B and C → D imply (A ∪ C) → (B ∪ D).</p>
      <p>
        [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] showed that a one-to-one correspondence between closure operators and
complete implicational system exists. The closure system associated to a
complete implicational system is CI = {C ⊆ S : ∀X ⊆ S, [X ⊆ C and X →
Y ] ⇒ Y ⊆ C}, while the implicational system associated to a closure mapping
is {X → Y : Y ⊆ σ(X)}.
      </p>
      <p>Example 1 (continued). The complete implicational system associated with the
lattice in Fig. 2 is the following:
c → e; d → e; b, c → d;
b, c → e; bc → d, e; b, d → c;
b, d → e; b, d → c, e; b, e → c;
b, e → d; b, e → c, d; c, d → b;
c, d → e; c, d → b, e; c, d, e → b;
b, d, e → c; b, c, e → d; b, c, d → e;</p>
      <p>As the above example shows, many implications in a complete implicational
system can be redundant: in our example, it is evident that if we have c →
e then we have b, c → e. So smaller implicational system allowing a smaller
representation of a complete implicational system is of interest. We say that
an implicational system Σ is a generating system for I if any implication of I
can be obtained from Σ by applying recursively the rules defining a complete
implicational system. A minimal generating system for I is called a basis for I,
and a minimum basis is called a canonical basis.</p>
      <p>
        One particular basis, called the stem basis [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], can be directly defined: the
stem basis is made of all implications X → σ(X) − X, with X a critical set. A
set Q ⊆ S is called a quasi-closed set if Q 6∈ C and C + {Q} is a closure system,
and Q is a F -quasi-closed set if Q is quasi-closed and σ(Q) = F . So a set C ⊆ S
is critical if there exists F ∈ C such that C is a minimal F -quasi-closed set.
Example 1 (continued). Canonical basis associated with the lattice of Fig.2.
      </p>
      <p>b, e → c, d; c → e; d → e; c, d, e → b;
3.5</p>
      <p>
        Overhanging Relation
An overhanging relation O is a binary relation on P(S) that was originated in
[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] in consensus theory on trees under the term of nesting, and was generalized
in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] to any lattice. We will indifferently write (A, B) ∈ O or A O B to signify
that a set A is overhanged in B. An overhanging relation satisfies the following
properties:
– for all A, B ∈ S, A O B implies A ⊂ B;
– for all A, B, C ∈ S, A ⊂ B ⊂ C implies [A O C ⇐⇒
– for all A, B ∈ S, A O (A ∪ B) implies (A ∩ B) O B.
      </p>
      <p>A O B or B O C];</p>
      <p>
        We showed in [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] that overhanging relations and closure operators (and
so lattices) are in a one-to-one correspondence by associating the overhanging
relation defined as A O B ⇐⇒ A ⊂ B and σ(A) ⊂ σ(B) to any closure operator,
and, conversely, associating the closure operator σ(X) = {x ∈ S : x Oc X ∪ {x}}
to any overhanging relation. In fact, an overhanging relation can be seen as a
kind of negative implication, as given by the equivalence that A → B if and only
if (A, A ∪ B) 6∈ O
Example 1 (continued). The overhanging relation associated with the lattice of
Fig.2 is as follows:
∅ O b ∅ O c
∅ O b, c ∅ O b, d
∅ O b, c, d b O b, c
b O b, c, d c O b, c
c O b, c, d d O b, d
d O b, c, d c, d O b, c, d
∅ O d
∅ O c, d
b O b, d
c O c, d
d O c, d
3.6
      </p>
      <p>Sperner Family
A Sperner family F on S is a family s.t. ∀X, Y ∈ F, X and Y are incomparable
for set inclusion. A Sperner village V = (F1, ..., Fn) on S is a set of n Sperner
families. The equivalence between a closure operator and a Sperner village is
obtained as follows: given σ closure operator, for any x ∈ S we create the Sperner
family Cx = {X ⊆ S : x ∈ σ(X) and X minimal for that property}. Conversely,
the closure operator associated with V is defined as σ(X) = {x ∈ S : X contains
a set of Cx}.</p>
      <p>Example 1 (continued). The Sperner village equivalent with our running
example is the following Fig. 4.</p>
      <p>
        When we add to the existing Sperner village the Sperner family {{e}, {b, c}},
the software computes the smallest Sperner village possible from the existing
village together with the new family, and from this Sperner village finds the
associated concept lattice. Fig. 5 shows the results.
The main focus of the software concerns the dependency between the different
cryptomorphisms associated with lattices. In the same pedagogical spirit, we
also implemented different properties of lattices and elements of lattices, briefly
described in Tab. 1 and in Tab. 2 for completeness sake. We refer the readers to
[
        <xref ref-type="bibr" rid="ref11 ref14 ref22">11, 14, 22</xref>
        ] for more information on lattices and lattice properties.
5
      </p>
    </sec>
    <sec id="sec-4">
      <title>Existing Software</title>
      <p>All of the software mentioned in Table 3 have different goals. In terms of ease of
use, Concept Explorer is the closest to our goal, but offers limited functionalities.
OpenFCA is similar to Concept Explorer, offering an interesting, web based and
intuitive approach to context creation, lattice visualization and attribute
exploration. FCAstone’s main purpose is file formats conversion to improve
interoperability between FCA and graph editing. The other software (Galicia, ToscanaJ,
Lattice Miner, FCART) were designed to push the boundaries of the scalability
of analysis and lattice drawing. Research wise, Formal Concept Analysis
Research Toolbox (FCART) is a particularly interesting approach of a universal
x is distributive ∀y, z ∈ L, x ∨ (y ∧ z) = (x ∨ y) ∧ (x ∨ z)
x is standard ∀y, z ∈ L, y ∧ (x ∨ z) = (y ∧ x) ∨ (y ∧ z)
x is neutral ∀y, z ∈ L, (x ∧ y) ∨ (y ∧ z) ∨ (x ∧ z) = (x ∨ y) ∧ (x ∨ z) ∧ (y ∨ z)
x is an articulation point ∀y ∈ L, either x ≤ y or y ≤ x
x is join-prime x ≤ a ∨ b implies x ≤ a or x ≤ b
x is meet-prime a ∧ b ≤ x implies a ≤ x or b ≤ x
integrated environment to lattice construction and Formal Concept Analysis
techniques, where one can test new algorithms for drawing lattice for example.
CryptoLat is a pedagogical and research oriented software in active development
phase, and it is open source and freely available. It is still in alpha testing, and
the next milestone of development is to make it cloud based with a web interface.</p>
      <p>
        Many other cryptomorphisms of concept lattices exist but are not
implemented yet. For example, [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] proved that we can associate a minimal separator
of the co-bipartite graph to every concept of the concept lattice, and [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] showed
a bijection between Moore families and ideal colour sets of the coloured poset.
Similarly we are planning to increase the number of properties available, adding
for example the dismantlable property (one can repeatedly remove a doubly
irreducible element until the lattice becomes a chain) or being a convex geometry
(∅ ∈ L and ∀x ∈ L, there is a unique minimal (for inclusion) generator of x). the
lattice drawing component is also under consideration, to be enhance and more
user friendly.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Adams</surname>
            <given-names>III</given-names>
          </string-name>
          ,
          <string-name>
            <surname>E.N.:</surname>
          </string-name>
          <article-title>N-trees as nestings: complexity, similarity and consensus</article-title>
          .
          <source>Journal of Classification</source>
          <volume>3</volume>
          ,
          <fpage>299</fpage>
          -
          <lpage>317</lpage>
          (
          <year>1986</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Armstrong</surname>
          </string-name>
          , W.W.:
          <article-title>Dependency structures of data base relationships</article-title>
          .
          <source>Information Processing</source>
          <volume>74</volume>
          ,
          <issue>580583</issue>
          (
          <year>1974</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Barbut</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Monjardet</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Ordres et classification: Alg`ebre et combinatoire (tome II)</article-title>
          . Hachette, Paris (
          <year>1970</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Berry</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sigayret</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Representing a concept lattice by a graph</article-title>
          .
          <source>Discrete Applied Mathematics</source>
          <volume>144</volume>
          (
          <issue>12</issue>
          ),
          <fpage>27</fpage>
          -
          <lpage>42</lpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Berry</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sigayret</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>A Peep through the Looking Glass: Articulation Points in Lattices</article-title>
          . In: Domenach,
          <string-name>
            <given-names>F.</given-names>
            ,
            <surname>Ignatov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            ,
            <surname>Poelmans</surname>
          </string-name>
          ,
          <string-name>
            <surname>J</surname>
          </string-name>
          . (Eds.)
          <source>Formal Concept Analysis</source>
          , Springer Berlin Heidelberg,
          <volume>7278</volume>
          ,
          <fpage>45</fpage>
          -
          <lpage>60</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Bertet</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>The dependence graph of a lattice</article-title>
          . In Szathmary, L.,
          <string-name>
            <surname>Priss</surname>
            ,
            <given-names>U</given-names>
          </string-name>
          . (Eds.):
          <source>CLA</source>
          <year>2012</year>
          ,
          <volume>223</volume>
          -
          <fpage>231</fpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Birkhoff</surname>
          </string-name>
          , G.:
          <article-title>Lattice Theory (Third ed</article-title>
          .). Providence,
          <string-name>
            <surname>R.I.</surname>
          </string-name>
          :
          <source>Amer. Math.Soc.</source>
          (
          <year>1967</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Borza</surname>
            ,
            <given-names>P.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sabou</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sacarea</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>OpenFCA, an open source formal concept analysis toolox</article-title>
          .
          <source>Proc. of IEEE International Conference on Automation Quality and Testing Robotics (AQTR)</source>
          ,
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Caspard</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Monjardet</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>The lattices of Moore families and closure operators on a finite set: a survey</article-title>
          .
          <source>Disc</source>
          . App. Math.
          <volume>127</volume>
          ,
          <fpage>241</fpage>
          -
          <lpage>269</lpage>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Caspard</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leclerc</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Monjardet</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <source>Finite Ordered Sets: Concepts</source>
          ,
          <source>Results and Uses</source>
          . Cambridge University Press (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Davey</surname>
            ,
            <given-names>B.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Priestley</surname>
            ,
            <given-names>H. A.</given-names>
          </string-name>
          :
          <article-title>Introduction to Lattices and Order</article-title>
          , 2nd ed. Cambridge University Press (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Domenach</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Leclerc</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Closure systems</article-title>
          ,
          <source>Implicational Systems, Overhanging Relations and the case of Hierarchical Classification. Math. Soc. Sci</source>
          .
          <volume>47</volume>
          (
          <issue>3</issue>
          ),
          <fpage>349</fpage>
          -
          <lpage>366</lpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Ganter</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wille</surname>
          </string-name>
          , R.:
          <source>Formal Concept Analysis, Mathematical Foundations</source>
          , Springer Verlag (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14. Gra¨tzer, G.:
          <article-title>General lattice theory</article-title>
          . Academic Press (
          <year>1978</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Guigues</surname>
            ,
            <given-names>J.-L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Duquenne</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Familles minimales d'implications informatives r´esultant d'un tableau de donn´ees binaires</article-title>
          .
          <source>Math. Sci. Hum</source>
          .
          <volume>95</volume>
          ,
          <fpage>5</fpage>
          -
          <lpage>18</lpage>
          (
          <year>1986</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Habib</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nourine</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>The number of Moore families on n=6</article-title>
          . Disc. Math.
          <volume>294</volume>
          (
          <issue>3</issue>
          ),
          <fpage>291</fpage>
          -
          <lpage>296</lpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Lahcen</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kwuida</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Lattice Miner: A Tool for Concept Lattice Construction and Exploration</article-title>
          . In Boumedjout, L.,
          <string-name>
            <surname>Valtchev</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kwuida</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sertkaya</surname>
            ,
            <given-names>B</given-names>
          </string-name>
          . (eds.):
          <source>Supplementary Proceeding of International Conference on Formal concept analysis (ICFCA'10)</source>
          ,
          <fpage>59</fpage>
          -
          <lpage>66</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Neznanov</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ilvovsky</surname>
            ,
            <given-names>D.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kusnetsov</surname>
            ,
            <given-names>S.O.</given-names>
          </string-name>
          :
          <article-title>FCART: A New FCA-based System for Data Analysis and Knowledge Discovery</article-title>
          . In Cellier, P.,
          <string-name>
            <surname>Distel</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ganter</surname>
            ,
            <given-names>B</given-names>
          </string-name>
          . (eds.):
          <article-title>Contributions to the 11th</article-title>
          <source>International Conference on Formal Concept Analysis</source>
          ,
          <fpage>65</fpage>
          -
          <lpage>78</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19. O¨re, O.:
          <article-title>Galois connexions</article-title>
          .
          <source>Trans. Amer. Math. Soc</source>
          .
          <volume>55</volume>
          (
          <issue>3</issue>
          ),
          <fpage>494</fpage>
          -
          <lpage>513</lpage>
          (
          <year>1944</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Plott</surname>
            ,
            <given-names>C.R.</given-names>
          </string-name>
          :
          <article-title>Path independence, rationality and social choice</article-title>
          .
          <source>Econometrica</source>
          <volume>41</volume>
          (
          <issue>6</issue>
          ),
          <volume>10751091</volume>
          (
          <year>1973</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Priss</surname>
            ,
            <given-names>U.</given-names>
          </string-name>
          :
          <article-title>FCA Software Interoperability</article-title>
          . In: Belohlavek,
          <string-name>
            <given-names>R.</given-names>
            ,
            <surname>Kuznetsov</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.O</surname>
          </string-name>
          . (eds.),
          <source>CLA</source>
          <year>2008</year>
          ,
          <volume>33144</volume>
          , (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Roman</surname>
            ,
            <given-names>S</given-names>
          </string-name>
          : Lattices and
          <string-name>
            <given-names>Ordered</given-names>
            <surname>Sets</surname>
          </string-name>
          . Springer (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Valtchev</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Grosser</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Roume</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rouane</surname>
            <given-names>Hacene</given-names>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          :
          <article-title>Galicia: An Open Platform for Lattices. In Using Conceptual Structures: Contributions to the 11th Intl</article-title>
          .
          <source>Conference on Conceptual Structures (ICCS'03)</source>
          ,
          <fpage>241</fpage>
          -
          <lpage>254</lpage>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Vogt</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wille</surname>
          </string-name>
          , R.:
          <article-title>TOSCANA - a graphical tool for analyzing and exploring data</article-title>
          . In Tamassia R.,
          <string-name>
            <surname>Tollis</surname>
            ,
            <given-names>I.G</given-names>
          </string-name>
          . (eds.),
          <string-name>
            <surname>Graph</surname>
            <given-names>Drawing</given-names>
          </string-name>
          , LNCS
          <volume>894</volume>
          ,
          <fpage>226</fpage>
          -
          <lpage>233</lpage>
          (
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Yevtushenko</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          :
          <article-title>System of data analysis ”Concept Explorer”</article-title>
          .
          <source>Proceedings of the 7th national conference on Artificial Intelligence KII-2000</source>
          , Russia (
          <year>2000</year>
          )
          <fpage>127</fpage>
          -
          <lpage>134</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>